TrustRadius Insights for Cisco Secure Endpoint are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.
Pros
Machine Learning Capabilities: Users have praised the detailed endpoint visibility provided by machine learning with behavioral analysis features, enhancing threat identification capabilities.
Integration with Cisco Security Products: Customers appreciate integrating with other Cisco security products, creating a comprehensive security environment that enhances overall protection.
Ease of Use: Users highlighted the product's ease of use as a significant factor in their positive experience, especially for small IT teams where deployment and security provision are crucial.
Effective Threat Identification: Reviewers have been impressed by the product's ability to identify threats that might have been overlooked, showcasing advanced threat detection capabilities.
Comprehensive Security Features: Users value the inclusion of the product in the Cisco Secure Client suite, streamlining distribution and reducing agents on end-user devices.
Cisco Secure Endpoint is our first line of defense for our biggest security risk, end users.
Pros
Endpoint protection
Endpoint monitoring
Endpoint isolation
Cons
Better availability for product whitelist for firewall and DNS
Stop isolation logs for troubleshooting
Likelihood to Recommend
We are very satisfied with CSE despite the few issues we have had. Overall the platform is well thought out and helps us manage our environment and risks.
VU
Verified User
Engineer in Information Technology (501-1000 employees)
We needed Endpoint Security solution and Cisco Secure Endpoint has Advanced Threat Detection which identifies and mitigates sophisticated cyber threats like ransomware, fileless malware, and zero-day attacks. In addition, Cisco Secure Endpoint has Integration with other Cisco solutions like Cisco ISE and provides visibility across endpoints which is very important for our organization.
Pros
Centralized management
Integration with other Cisco products
Part of XDR solution
Cons
Older PCs can be slower with Cisco agent
Likelihood to Recommend
If you have modern PC with Windows 11 it is good, for older PCs with weak hardware it is slower
VU
Verified User
Team Lead in Information Technology (201-500 employees)
Cisco Secure Endpoint is used for antivirus and thread protection in our organisation. It comes as a part of Cisco Secure Client. It allows to run custom scans as well as full system scans whenever I need to run them, it can be when I have some new program exe files downloaded from the internet and require to check if they are safe.
Pros
Allows to run custom scans on files and folders manually by selecting the required folder it helps to ensure that the files are safe and threat free.
Cons
There is no notification on the standard scans that are scheduled daily on the system. These can be made available in the event history just to be sure that the system have undergone a recent antivirus scan
Likelihood to Recommend
Secure endpoint is well suited if you require to run a custom scan on just a folder or a file and be assured that the file is safe to use
We use it to do VPN back to our network from our laptops and from our desktops before offsite endpoint encryption.
Pros
It's kind of easy to use. It's pretty user-friendly. So the way we have it configured in our agency is we have it automatically connect. So the user-friendliness is great. You don't have to know what you're doing.
Cons
I really don't know because it does what we want it to do and it does it pretty easily, so I don't really have any.
Likelihood to Recommend
I think it works really well for remote workers or anyone connecting out externally into their network. Probably not necessary if you're on-Prem and if you work in your office and you don't need to locally connect, you probably don't need to use it. Maybe you do. I don't have a use case.
VU
Verified User
Engineer in Information Technology (501-1000 employees)
Our organization uses Cisco Secure Endpoint to track activity on all of the desktops and laptops in our organization. Cisco Secure Endpoint helps identify potential problems to malicious activity. It sends alerts when malicious files or malicious activity is found. It also will act to contain any known issues so that the problem does not spread onto our network.
Pros
Identifies malicious files on an endpoint
Contains malicious files to prevent spreading of harmful issues
Sends out alerts to notify administrators of the network and keep them informed
Cons
Frequent name changes are not helpful
Some of the reports that get sent are very high-end reports with lots of information. It would be nice if there was a simplified report that could be sent automatically when an issue is identified on a computer
Likelihood to Recommend
Cisco Secure Endpoint is well suited for keeping track of the many different and points that we have in our organization. All of these devices can easily be monitored with Cisco Secure Endpoint. It can monitor our servers and our desktops and laptops in our environment. It isn’t as appropriate for our student devices. However, those aren’t as critical since they are just Chromebooks.
In our organization, we use Cisco Secure Endpoint to keep all our devices safe from cyber threats. It's like a security guard that watches over our computers, laptops, and mobile devices, making sure they are protected from things like malware and ransomware. As far as the business problems which are addressed by Cisco Secure Endpoint, these include: threat detection and response, endpoint security, incident response, visibility and control, and integration and automation with our other security tools. We've rolled it out across all Windows devices in the company and it keeps an eye on things 24/7, providing real-time updates and threat intelligence.
Pros
machine learning with behavioral analysis
provides detailed endpoint visibility.
integration with other Cisco security products
comprehensive endpoint security
Cons
Simplified Management Interface
Enhanced Machine Learning Models
Behavioral Analytics Refinement
Likelihood to Recommend
Cisco Secure Endpoint has comprehensive protection across different operating systems and device types. Its scalability and centralized management capabilities make it a good fit for companies with large deployments. It's also helpful for threat hunting and rapid incident response by our security teams. It would be less appropriate in environments with limited resources (older, low compute, etc). It's also not the most budge friendly option available.
Business. Definitely. So we use the product for our end user devices. We're protecting all our servers, all our endpoints, so mobile phones as well. So we've got security on all those devices and how we use to protect those devices is just ensuring that they're up to date. They've got to fix the good detection mechanisms that the secure endpoint has enabled you to. If it detects that there's a vulnerability, it'll automatically lock it down and the user has to come and an IT admin would have to come and enable connectivity back to the user device. Pretty amazing stuff. I haven't seen anything else like it out there and it's a lifesaver for us.
Pros
Once we, I guess one turned out that path because we have a small IT team, one of the big factors that came into play is how easy it was to deploy and the kind of security it provides for your endpoint devices. For us, it's got all those AI capabilities that really help. So traditionally when there was an incident on Alert on an antivirus program, you'd have a couple of guys run across the office to try to pull a plug. One of the awesome features with Secure Endpoint is its isolation mode that clamps down endpoint devices and then just isolate it. It's connected to, I think Cisco's tell us the threat intel environment. So they've got up-to-date metrics and fixes on threats out in the wild. And once they detect that, they apply it across your whole brand. So yeah, really effective for us.
One of the things that really stands out is the retrospective detections. So say something's detected two weeks later of a product that you had on your system. Initially it scanned it past, but then they discover vulnerability. The product has the ability to come back and retrospectively apply restrictions on specific applications you have on your environment. So I think that's one key winner.
Cons
There's a lot of content on the dashboards. I think some of the areas you could improve it just with the notifications, maybe adding on some video tutorials on how to navigate through the screens and that kind of stuff. But otherwise it's pretty intuitive, easy to use. And I guess if some of the integrations with the secure X and all that kind of thing, I think for my users they just need a bit more training on that.
Likelihood to Recommend
I think you need it for all your endpoint devices, whether you are running an organization or for home use, it's just that level of security that will help out if you don't have the firewalls, all the fancy XDR equipment, all that kind of stuff, just having this on your endpoint will save your life. So even if there's a compromise in your network, it has the capability to isolate. Restrict so that you can't lose any more data or nothing else gets in.